Sample questions

Q1. Which one of the following is not a security testing control?

  1. Vulnerability assessment
  2. Penetration testing
  3. Departmental tests
  4. Denial of Service Tests

Q2. Access is controlled through a retina scanner for the identification, authentication, and authorization of operators to a data center. A legitimate user was erroneously denied access during a scan. Such errors can be categorized under which one of the following?

  1. False negative
  2. False positive
  3. False rating
  4. True negative

Q3. The effectiveness of a security control is a measure for which one of the following?

  1. Expected outcome of a control action
  2. Efficient process
  3. Security policy
  4. Security procedure

Q4. The collection of security process, test data, and reporting is used to verify what?

  1. Security controls are documented
  2. Employee awareness about security controls
  3. Avoid social engineering attacks
  4. Security policies and procedures are continuously and uniformly applied

Q5. Third-party audits are conducted for what?

  1. Independent review of security
  2. Internal review of security
  3. Management review of security
  4. Administrative control validation

Q6. Audit logs may include all of these except:

  1. The terminal or location from which the user accessed the system
  2. Passwords provided by the users
  3. Any changes to system configuration
  4. Accessed information including files and the data

Q7. Identify some of the best practices in the information system audit control? (This is a drag-and-drop type of question. Here, and for similar drag-and-drop questions, you can draw a line from the list of answers from the left to the empty box on the right).

Sample questions

Q8. An organization engages an agency to conduct an independent audit on its systems. Such an audit is known as what?

  1. Internal audit
  2. Second party audit
  3. Third party audit
  4. Compliance review
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.118.144.248